SlideShare a Scribd company logo
Chapter 11
Implementing Policies
to Mitigate Risks
CompTIA Security+
Get Certified Get Ahead
1
Introduction
• Exploring security policies
• Protecting data
• Responding to incidents
• Providing training
Exploring
Security
Policies
• Security policies
– Written documents that
identify a security plan
• Security controls enforce security
policies
– Technical, administrative, physical
Exploring
Security
Policies
• Acceptable use policy
– Defines proper system usage
– Users often required to read and sign
an AUP when hired and periodically
• Mandatory vacations
– Require employees to take time away
from the job
– Helps reduce fraud and discover
malicious activities
Personnel
Policies
• Separation of duties
– Prevents any single person or entity
from being able to complete all the
functions of a process
– Divides tasks between employees
• Job rotation
– Require employees to change roles on a
regular basis
– Helps ensure that employees cannot
continue with fraudulent activity
indefinitely
Personnel
Policies
• Clean desk policy
– Requires users to organize their areas
– Reduces risk of possible data theft
– Reminds users to secure sensitive data
– May include a statement
about not writing down
passwords
Personnel
Policies
• Background check
– Varies based on job
• Non-disclosure agreement (NDA)
– NDAs prohibit data sharing
• Exit interview
Personnel
Policies
• Onboarding
– Offboarding
• Policy violations
– Adverse actions generally dependent
on violation
Other
General
Security
Policies
• Social media
• Banner ads and malvertisements
• Social networking
Agreement
Types
• Interconnection security
agreement (ISA)
– Ensures strict guidelines protect data
while in transit
• Service level agreement (SLA)
– Agreement that stipulates performance
expectations
• Memorandum of understanding
(MOU)
– Defines responsibilities of each party
• Business partners agreement
– Details relationship
Protecting
Data
• Information classification
– Helps ensure users understand the
value of data
– Helps protect sensitive data
– Classifications defined in security policy
• Public data
– Confidential data
– Proprietary data
– Private data
Protecting
Data
• Data labeling and handling
– Helps ensure personnel apply the
proper security controls to protect
information
– Physical labels
– Digital labels
Data
Destruction
& Media
Sanitization
• Purging
• File shredding
• Wiping
• Erasing and overwriting
• Burning
Consider SSDs
Data
Destruction
& Media
Sanitization
• Paper shredding
• Pulping
• Degaussing
• Pulverizing
Data
Destruction
& Media
Sanitization
• Storage and retention policies
– Identify where data is stored
– Identify how long it is retained
– Retention policies
• May limit a company’s exposure to legal
proceedings
• May reduce the amount of labor required to
respond to court orders
Protecting
Data
• Personally identifiable information
(PII)
– Includes information such as:
• Full name, birthdate, biometric data,
identifying numbers
– Requires special handing
– Employees should be trained not to
give out PII
– Many laws mandate the reporting of PII
data losses
• Personal Health Information (PHI)
– PII that includes health information
– Includes information on employee
health plans
Protecting
Data
• Personally identifiable information
(PII)
– Includes information such as:
• Full name, birthdate, biometric data,
identifying numbers
– Requires special handing
– Employees should be trained not to
give out PII
– Many laws mandate the reporting of PII
data losses
• Personal Health Information (PHI)
– PII that includes health information
– Includes information on employee
health plans
Legal and
Compliance
Issues
• Health Insurance Portability and
Accountability Act of 1996 (HIPAA)
• Gramm-Leach Bliley Act (GLBA)
• Sarbanes-Oxley Act (SOX)
• General Data Protection
Regulation (GDPR)
Data Roles and
Responsibilities
• Owner
– Overall responsibility
• Steward/custodian
– Handles routine tasks
• Privacy officer
– Responsible for ensuring compliance
Responding to
Incidents
• Incident
– An adverse event or series of events
– Can negatively affect the
confidentiality, integrity, or availability
of data or systems
• Examples
– Attacks
– Release of malware
– Security policy violations
– Unauthorized access of data
– Inappropriate usage of systems
Incident
Response Plan
• Incident types
• Cyber-incident response teams
• Roles and responsibilities
• Escalation
• Reporting requirements
• Exercises
Incident
Response
Process
• Preparation
• Identification
• Containment
• Eradication
• Recovery
• Lessons learned
Basic Forensic
Procedures
• Overview
– Collect evidence
– Control evidence
– Evaluate evidence
Basic Forensic
Procedures
• Order of volatility
– Collect most volatile data first
– Collect least volatile data last
– RAM is volatile
• Lost when a computer is
powered down
– Data in RAM includes
• Processes and applications
• Data recently accessed
by a user
Least to Most Volatile
• Cache memory
• Regular RAM
• Swap or paging file
• Hard drive data
• Logs stored on
remote systems
• Archived media
Data
Acquisition
• Capture images
– Forensic image
• Bit-by-bit copy of the data
• Does not modify the data during the capture
• Experts capture an image before analysis
• Analysis can modify the data
• Original data is preserved to maintain its
usability as evidence
• Forensic experts analyze the image or image
copy
• Original kept in an unmodified state
Data
Acquisition
• Take hashes
– Hashing provides integrity for captured
images
– Includes images of memory and disk
drives
• Network traffic and logs
– Can identify computers and some of
their activity
– MAC address can identify a computer
– More definitive than an IP address or
name
Data
Acquisition
• Capture video
– CCTV
– Reliable proof
• Record time offset
Data
Acquisition
• Screenshots
– Print screen
• Witnesses
– Ask, ask, ask
Data
Acquisition
• Chain of custody
– Provides assurances that evidence has
been controlled and handled properly
– Documents who handled the evidence
and when
• Legal hold
– Response to a court order
Data
Acquisition
• Active logging
– For intelligence gathering
– Increases logging after an incident
• Track man hours and expense
– Useful for budgets and assessments
Providing
Training
• Role-based Training
– Targeted to users based on their roles
• Data owner
• System administrator
• System owner
• User
• Privileged user
• Executive user
• Incident response team
Providing
Training
• Continuing education
– Not a one-time event
• Training and compliance issues
– Often needed to comply with laws,
best practices, and standards
– Comply with PII protection issues
– PCI DSS for credit cards
Troubleshootin
g Personnel
Issues
• Insider threat
• Personal email
• Policy violation
• Social engineering
• Social media
Chapter 11
Summary
• Exploring security policies
• Protecting data
• Responding to incidents
• Providing training

More Related Content

What's hot

7. Security Operations
7. Security Operations7. Security Operations
7. Security Operations
Sam Bowne
 
CISSP Prep: Ch 3. Asset Security
CISSP Prep: Ch 3. Asset SecurityCISSP Prep: Ch 3. Asset Security
CISSP Prep: Ch 3. Asset Security
Sam Bowne
 
2. Asset Security
2. Asset Security2. Asset Security
2. Asset Security
Sam Bowne
 
CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)
Sam Bowne
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
Sam Bowne
 
6. Security Assessment and Testing
6. Security Assessment and Testing6. Security Assessment and Testing
6. Security Assessment and Testing
Sam Bowne
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security Engineering
Sam Bowne
 
CNIT 125: Ch 2. Security and Risk Management (Part 1)
CNIT 125: Ch 2. Security and Risk Management (Part 1)CNIT 125: Ch 2. Security and Risk Management (Part 1)
CNIT 125: Ch 2. Security and Risk Management (Part 1)
Sam Bowne
 
CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)
Sam Bowne
 
CISSP Prep: Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 4. Security Engineering (Part 1)CISSP Prep: Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 4. Security Engineering (Part 1)
Sam Bowne
 
CNIT 125 Ch 3. Asset Security
CNIT 125 Ch 3. Asset SecurityCNIT 125 Ch 3. Asset Security
CNIT 125 Ch 3. Asset Security
Sam Bowne
 
CNIT 125: Ch 4. Security Engineering (Part 1)
CNIT 125: Ch 4. Security Engineering (Part 1)CNIT 125: Ch 4. Security Engineering (Part 1)
CNIT 125: Ch 4. Security Engineering (Part 1)
Sam Bowne
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security Engineering
Sam Bowne
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
Sam Bowne
 
CISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security OperationsCISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security Operations
Karthikeyan Dhayalan
 
CNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and TestingCNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and Testing
Sam Bowne
 
CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)
Sam Bowne
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, Outsourcing
Nicholas Davis
 
Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentation
Art Morrison
 
Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentation
Art Morrison
 

What's hot (20)

7. Security Operations
7. Security Operations7. Security Operations
7. Security Operations
 
CISSP Prep: Ch 3. Asset Security
CISSP Prep: Ch 3. Asset SecurityCISSP Prep: Ch 3. Asset Security
CISSP Prep: Ch 3. Asset Security
 
2. Asset Security
2. Asset Security2. Asset Security
2. Asset Security
 
CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
 
6. Security Assessment and Testing
6. Security Assessment and Testing6. Security Assessment and Testing
6. Security Assessment and Testing
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security Engineering
 
CNIT 125: Ch 2. Security and Risk Management (Part 1)
CNIT 125: Ch 2. Security and Risk Management (Part 1)CNIT 125: Ch 2. Security and Risk Management (Part 1)
CNIT 125: Ch 2. Security and Risk Management (Part 1)
 
CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)
 
CISSP Prep: Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 4. Security Engineering (Part 1)CISSP Prep: Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 4. Security Engineering (Part 1)
 
CNIT 125 Ch 3. Asset Security
CNIT 125 Ch 3. Asset SecurityCNIT 125 Ch 3. Asset Security
CNIT 125 Ch 3. Asset Security
 
CNIT 125: Ch 4. Security Engineering (Part 1)
CNIT 125: Ch 4. Security Engineering (Part 1)CNIT 125: Ch 4. Security Engineering (Part 1)
CNIT 125: Ch 4. Security Engineering (Part 1)
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security Engineering
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
 
CISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security OperationsCISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security Operations
 
CNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and TestingCNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and Testing
 
CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, Outsourcing
 
Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentation
 
Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentation
 

Similar to 501 ch 11 operational security

CF.ppt
CF.pptCF.ppt
CF.ppt
KhusThakkar
 
Encryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a PanaceaEncryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a Panacea
Resilient Systems
 
Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidence
Online
 
CERN 5 Things you should know about Data Protection
CERN 5 Things you should know about Data ProtectionCERN 5 Things you should know about Data Protection
CERN 5 Things you should know about Data Protection
EUDAT
 
GDPR Privacy Introduction
GDPR Privacy IntroductionGDPR Privacy Introduction
GDPR Privacy Introduction
NiclasGranqvist
 
Learning about Security and Compliance in Office 365
Learning about Security and Compliance in Office 365Learning about Security and Compliance in Office 365
Learning about Security and Compliance in Office 365
Aptera Inc
 
SECURITY-MEASURES-GROUP-5.pptx
SECURITY-MEASURES-GROUP-5.pptxSECURITY-MEASURES-GROUP-5.pptx
SECURITY-MEASURES-GROUP-5.pptx
ssuserfa4a14
 
Prepare Your Firm for GDPR
Prepare Your Firm for GDPRPrepare Your Firm for GDPR
Prepare Your Firm for GDPR
MyComplianceOffice
 
Introduction to data protection
Introduction to data protectionIntroduction to data protection
Introduction to data protection
Rachel Aldighieri
 
Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event
Vuzion
 
CISSP - Chapter 2 - Asset Security
CISSP - Chapter 2 -  Asset SecurityCISSP - Chapter 2 -  Asset Security
CISSP - Chapter 2 - Asset Security
Karthikeyan Dhayalan
 
An introduction to data protection - Edinburgh
An introduction to data protection - EdinburghAn introduction to data protection - Edinburgh
An introduction to data protection - Edinburgh
Rachel Aldighieri
 
Cor concepts information governance-protection-of-personal-information-act-popi
Cor concepts information governance-protection-of-personal-information-act-popiCor concepts information governance-protection-of-personal-information-act-popi
Cor concepts information governance-protection-of-personal-information-act-popi
Robust Marketing & Consulting (Pty) Ltd
 
Cyber security
Cyber securityCyber security
Cyber security
Peter Henley
 
Media_644046_smxx (1).pptx
Media_644046_smxx (1).pptxMedia_644046_smxx (1).pptx
Media_644046_smxx (1).pptx
MichelleSaver
 
3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE
CFG
 
Data compliance - get it right the first time (Black/White printable PDF)
Data compliance - get it right the first time (Black/White printable PDF)Data compliance - get it right the first time (Black/White printable PDF)
Data compliance - get it right the first time (Black/White printable PDF)
Peter GEELEN ✔
 
Session4807.ppt
Session4807.pptSession4807.ppt
Session4807.ppt
talkaton
 
Legal and data protection update
Legal and data protection updateLegal and data protection update
Legal and data protection update
Rachel Aldighieri
 
Personal Information Protection and Electronic Documents Act (PIPEDA) and Imp...
Personal Information Protection and Electronic Documents Act (PIPEDA) and Imp...Personal Information Protection and Electronic Documents Act (PIPEDA) and Imp...
Personal Information Protection and Electronic Documents Act (PIPEDA) and Imp...
Michael Sukachev
 

Similar to 501 ch 11 operational security (20)

CF.ppt
CF.pptCF.ppt
CF.ppt
 
Encryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a PanaceaEncryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a Panacea
 
Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidence
 
CERN 5 Things you should know about Data Protection
CERN 5 Things you should know about Data ProtectionCERN 5 Things you should know about Data Protection
CERN 5 Things you should know about Data Protection
 
GDPR Privacy Introduction
GDPR Privacy IntroductionGDPR Privacy Introduction
GDPR Privacy Introduction
 
Learning about Security and Compliance in Office 365
Learning about Security and Compliance in Office 365Learning about Security and Compliance in Office 365
Learning about Security and Compliance in Office 365
 
SECURITY-MEASURES-GROUP-5.pptx
SECURITY-MEASURES-GROUP-5.pptxSECURITY-MEASURES-GROUP-5.pptx
SECURITY-MEASURES-GROUP-5.pptx
 
Prepare Your Firm for GDPR
Prepare Your Firm for GDPRPrepare Your Firm for GDPR
Prepare Your Firm for GDPR
 
Introduction to data protection
Introduction to data protectionIntroduction to data protection
Introduction to data protection
 
Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event
 
CISSP - Chapter 2 - Asset Security
CISSP - Chapter 2 -  Asset SecurityCISSP - Chapter 2 -  Asset Security
CISSP - Chapter 2 - Asset Security
 
An introduction to data protection - Edinburgh
An introduction to data protection - EdinburghAn introduction to data protection - Edinburgh
An introduction to data protection - Edinburgh
 
Cor concepts information governance-protection-of-personal-information-act-popi
Cor concepts information governance-protection-of-personal-information-act-popiCor concepts information governance-protection-of-personal-information-act-popi
Cor concepts information governance-protection-of-personal-information-act-popi
 
Cyber security
Cyber securityCyber security
Cyber security
 
Media_644046_smxx (1).pptx
Media_644046_smxx (1).pptxMedia_644046_smxx (1).pptx
Media_644046_smxx (1).pptx
 
3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE
 
Data compliance - get it right the first time (Black/White printable PDF)
Data compliance - get it right the first time (Black/White printable PDF)Data compliance - get it right the first time (Black/White printable PDF)
Data compliance - get it right the first time (Black/White printable PDF)
 
Session4807.ppt
Session4807.pptSession4807.ppt
Session4807.ppt
 
Legal and data protection update
Legal and data protection updateLegal and data protection update
Legal and data protection update
 
Personal Information Protection and Electronic Documents Act (PIPEDA) and Imp...
Personal Information Protection and Electronic Documents Act (PIPEDA) and Imp...Personal Information Protection and Electronic Documents Act (PIPEDA) and Imp...
Personal Information Protection and Electronic Documents Act (PIPEDA) and Imp...
 

More from gocybersec

501 ch 3 network technologies and tools
501 ch 3 network technologies and tools501 ch 3 network technologies and tools
501 ch 3 network technologies and tools
gocybersec
 
501 ch 10 understanding cryptography and pki
501 ch 10 understanding cryptography and pki501 ch 10 understanding cryptography and pki
501 ch 10 understanding cryptography and pki
gocybersec
 
501 ch 9 implementing controls to protect assets
501 ch 9 implementing controls to protect assets501 ch 9 implementing controls to protect assets
501 ch 9 implementing controls to protect assets
gocybersec
 
501 ch 8 risk managment tool
501 ch 8 risk managment tool501 ch 8 risk managment tool
501 ch 8 risk managment tool
gocybersec
 
501 ch 7 protecting against advanced attacks
501 ch 7 protecting against advanced attacks501 ch 7 protecting against advanced attacks
501 ch 7 protecting against advanced attacks
gocybersec
 
501 ch 6 threats vulnerabilities and common attacks
501 ch 6 threats vulnerabilities and common attacks501 ch 6 threats vulnerabilities and common attacks
501 ch 6 threats vulnerabilities and common attacks
gocybersec
 
501 ch 5 securing hosts and data
501 ch 5 securing hosts and data501 ch 5 securing hosts and data
501 ch 5 securing hosts and data
gocybersec
 
501 ch 4 securing your network
501 ch 4 securing your network501 ch 4 securing your network
501 ch 4 securing your network
gocybersec
 
501 ch 3 network technologies tools
501 ch 3 network technologies tools501 ch 3 network technologies tools
501 ch 3 network technologies tools
gocybersec
 
501 ch 2 understanding iam
501 ch 2 understanding iam501 ch 2 understanding iam
501 ch 2 understanding iam
gocybersec
 
501 ch 1 mastering security basics
501 ch 1 mastering security basics501 ch 1 mastering security basics
501 ch 1 mastering security basics
gocybersec
 
501 ch 7 advanced attacks
501 ch 7 advanced attacks501 ch 7 advanced attacks
501 ch 7 advanced attacks
gocybersec
 
501 ch 4 securing your network
501 ch 4 securing your network501 ch 4 securing your network
501 ch 4 securing your network
gocybersec
 
501 ch 3 network technologies tools
501 ch 3 network technologies tools501 ch 3 network technologies tools
501 ch 3 network technologies tools
gocybersec
 
501 ch-1-mastering-security-basics
501 ch-1-mastering-security-basics501 ch-1-mastering-security-basics
501 ch-1-mastering-security-basics
gocybersec
 

More from gocybersec (15)

501 ch 3 network technologies and tools
501 ch 3 network technologies and tools501 ch 3 network technologies and tools
501 ch 3 network technologies and tools
 
501 ch 10 understanding cryptography and pki
501 ch 10 understanding cryptography and pki501 ch 10 understanding cryptography and pki
501 ch 10 understanding cryptography and pki
 
501 ch 9 implementing controls to protect assets
501 ch 9 implementing controls to protect assets501 ch 9 implementing controls to protect assets
501 ch 9 implementing controls to protect assets
 
501 ch 8 risk managment tool
501 ch 8 risk managment tool501 ch 8 risk managment tool
501 ch 8 risk managment tool
 
501 ch 7 protecting against advanced attacks
501 ch 7 protecting against advanced attacks501 ch 7 protecting against advanced attacks
501 ch 7 protecting against advanced attacks
 
501 ch 6 threats vulnerabilities and common attacks
501 ch 6 threats vulnerabilities and common attacks501 ch 6 threats vulnerabilities and common attacks
501 ch 6 threats vulnerabilities and common attacks
 
501 ch 5 securing hosts and data
501 ch 5 securing hosts and data501 ch 5 securing hosts and data
501 ch 5 securing hosts and data
 
501 ch 4 securing your network
501 ch 4 securing your network501 ch 4 securing your network
501 ch 4 securing your network
 
501 ch 3 network technologies tools
501 ch 3 network technologies tools501 ch 3 network technologies tools
501 ch 3 network technologies tools
 
501 ch 2 understanding iam
501 ch 2 understanding iam501 ch 2 understanding iam
501 ch 2 understanding iam
 
501 ch 1 mastering security basics
501 ch 1 mastering security basics501 ch 1 mastering security basics
501 ch 1 mastering security basics
 
501 ch 7 advanced attacks
501 ch 7 advanced attacks501 ch 7 advanced attacks
501 ch 7 advanced attacks
 
501 ch 4 securing your network
501 ch 4 securing your network501 ch 4 securing your network
501 ch 4 securing your network
 
501 ch 3 network technologies tools
501 ch 3 network technologies tools501 ch 3 network technologies tools
501 ch 3 network technologies tools
 
501 ch-1-mastering-security-basics
501 ch-1-mastering-security-basics501 ch-1-mastering-security-basics
501 ch-1-mastering-security-basics
 

Recently uploaded

বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 

Recently uploaded (20)

বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 

501 ch 11 operational security

  • 1. Chapter 11 Implementing Policies to Mitigate Risks CompTIA Security+ Get Certified Get Ahead 1
  • 2. Introduction • Exploring security policies • Protecting data • Responding to incidents • Providing training
  • 3. Exploring Security Policies • Security policies – Written documents that identify a security plan • Security controls enforce security policies – Technical, administrative, physical
  • 4. Exploring Security Policies • Acceptable use policy – Defines proper system usage – Users often required to read and sign an AUP when hired and periodically • Mandatory vacations – Require employees to take time away from the job – Helps reduce fraud and discover malicious activities
  • 5. Personnel Policies • Separation of duties – Prevents any single person or entity from being able to complete all the functions of a process – Divides tasks between employees • Job rotation – Require employees to change roles on a regular basis – Helps ensure that employees cannot continue with fraudulent activity indefinitely
  • 6. Personnel Policies • Clean desk policy – Requires users to organize their areas – Reduces risk of possible data theft – Reminds users to secure sensitive data – May include a statement about not writing down passwords
  • 7. Personnel Policies • Background check – Varies based on job • Non-disclosure agreement (NDA) – NDAs prohibit data sharing • Exit interview
  • 8. Personnel Policies • Onboarding – Offboarding • Policy violations – Adverse actions generally dependent on violation
  • 9. Other General Security Policies • Social media • Banner ads and malvertisements • Social networking
  • 10. Agreement Types • Interconnection security agreement (ISA) – Ensures strict guidelines protect data while in transit • Service level agreement (SLA) – Agreement that stipulates performance expectations • Memorandum of understanding (MOU) – Defines responsibilities of each party • Business partners agreement – Details relationship
  • 11. Protecting Data • Information classification – Helps ensure users understand the value of data – Helps protect sensitive data – Classifications defined in security policy • Public data – Confidential data – Proprietary data – Private data
  • 12. Protecting Data • Data labeling and handling – Helps ensure personnel apply the proper security controls to protect information – Physical labels – Digital labels
  • 13. Data Destruction & Media Sanitization • Purging • File shredding • Wiping • Erasing and overwriting • Burning Consider SSDs
  • 14. Data Destruction & Media Sanitization • Paper shredding • Pulping • Degaussing • Pulverizing
  • 15. Data Destruction & Media Sanitization • Storage and retention policies – Identify where data is stored – Identify how long it is retained – Retention policies • May limit a company’s exposure to legal proceedings • May reduce the amount of labor required to respond to court orders
  • 16. Protecting Data • Personally identifiable information (PII) – Includes information such as: • Full name, birthdate, biometric data, identifying numbers – Requires special handing – Employees should be trained not to give out PII – Many laws mandate the reporting of PII data losses • Personal Health Information (PHI) – PII that includes health information – Includes information on employee health plans
  • 17. Protecting Data • Personally identifiable information (PII) – Includes information such as: • Full name, birthdate, biometric data, identifying numbers – Requires special handing – Employees should be trained not to give out PII – Many laws mandate the reporting of PII data losses • Personal Health Information (PHI) – PII that includes health information – Includes information on employee health plans
  • 18. Legal and Compliance Issues • Health Insurance Portability and Accountability Act of 1996 (HIPAA) • Gramm-Leach Bliley Act (GLBA) • Sarbanes-Oxley Act (SOX) • General Data Protection Regulation (GDPR)
  • 19. Data Roles and Responsibilities • Owner – Overall responsibility • Steward/custodian – Handles routine tasks • Privacy officer – Responsible for ensuring compliance
  • 20. Responding to Incidents • Incident – An adverse event or series of events – Can negatively affect the confidentiality, integrity, or availability of data or systems • Examples – Attacks – Release of malware – Security policy violations – Unauthorized access of data – Inappropriate usage of systems
  • 21. Incident Response Plan • Incident types • Cyber-incident response teams • Roles and responsibilities • Escalation • Reporting requirements • Exercises
  • 22. Incident Response Process • Preparation • Identification • Containment • Eradication • Recovery • Lessons learned
  • 23. Basic Forensic Procedures • Overview – Collect evidence – Control evidence – Evaluate evidence
  • 24. Basic Forensic Procedures • Order of volatility – Collect most volatile data first – Collect least volatile data last – RAM is volatile • Lost when a computer is powered down – Data in RAM includes • Processes and applications • Data recently accessed by a user Least to Most Volatile • Cache memory • Regular RAM • Swap or paging file • Hard drive data • Logs stored on remote systems • Archived media
  • 25. Data Acquisition • Capture images – Forensic image • Bit-by-bit copy of the data • Does not modify the data during the capture • Experts capture an image before analysis • Analysis can modify the data • Original data is preserved to maintain its usability as evidence • Forensic experts analyze the image or image copy • Original kept in an unmodified state
  • 26. Data Acquisition • Take hashes – Hashing provides integrity for captured images – Includes images of memory and disk drives • Network traffic and logs – Can identify computers and some of their activity – MAC address can identify a computer – More definitive than an IP address or name
  • 27. Data Acquisition • Capture video – CCTV – Reliable proof • Record time offset
  • 28. Data Acquisition • Screenshots – Print screen • Witnesses – Ask, ask, ask
  • 29. Data Acquisition • Chain of custody – Provides assurances that evidence has been controlled and handled properly – Documents who handled the evidence and when • Legal hold – Response to a court order
  • 30. Data Acquisition • Active logging – For intelligence gathering – Increases logging after an incident • Track man hours and expense – Useful for budgets and assessments
  • 31. Providing Training • Role-based Training – Targeted to users based on their roles • Data owner • System administrator • System owner • User • Privileged user • Executive user • Incident response team
  • 32. Providing Training • Continuing education – Not a one-time event • Training and compliance issues – Often needed to comply with laws, best practices, and standards – Comply with PII protection issues – PCI DSS for credit cards
  • 33. Troubleshootin g Personnel Issues • Insider threat • Personal email • Policy violation • Social engineering • Social media
  • 34. Chapter 11 Summary • Exploring security policies • Protecting data • Responding to incidents • Providing training